Skip to content
TUM Library
OPAC
Universitätsbibliothek
Technische Universität München
  • Temporarily saved: 0 temporarily saved (Full)
  • Help
    • Contact
    • Search Tips
    • Interlibary loan info
  • Chat
  • Tools
    • Search History
    • Open Interlibary Loan
    • Recommend a Purchase
  • Deutsch
  • Account

    Account

    • Borrowed Items
    • Requested Items
    • Fees
    • Profile
    • Search History
  • Log Out
  • Login
  • Books & Journals
  • Papers
Advanced
  • Enterprise cybersecurity study...
  • Cite this
  • Email this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
    • Export to BibTeX
    • Export to RIS
  • Add to favorites
  • Save temporarily Remove from Book Bag
  • Permalink
Cover Image
Enterprise cybersecurity study guide: how to build a successful cyberdefense program against advanced threats
Saved in:
Bibliographic Details
Main Authors: Donaldson, Scott E. (Author), Siegel, Stanley G. (Author), Williams, Chris K. (Author), Aslam, Abdul (Author)
Format: Book
Language:English
Published: New York, NY Apress [2018]
Subjects:
Computersicherheit
Cybersecurity
Cyberdefense
Cybersecurity framework
Cybersecurity architecture
Cybersecurity functional areas
Cybersecurity capabilities
Cybersecurity operations
Cybersecurity controls
Enterprise security posture
Cybersecurity program
Cybersecurity program audits
Cybersecurity program assessments
Cybersecurity measurement
Cybersecurity responsibilities
Cybersecurity policy
Security
Infosec
Data Encryption
Systems and Data Security
Links:http://deposit.dnb.de/cgi-bin/dokserv?id=da3d6ab5c74a45b7a6ac01dc66a9535a&prov=M&dok_var=1&dok_ext=htm
Physical Description:xlv, 709 Seiten Illustrationen
ISBN:9781484232576
1484232577
Staff View

MARC

LEADER 00000nam a2200000 c 4500
001 BV045089996
003 DE-604
005 20180829
007 t|
008 180717s2018 xxua||| |||| 00||| eng d
016 7 |a 1141069652  |2 DE-101 
020 |a 9781484232576  |c pbk.  |9 978-1-4842-3257-6 
020 |a 1484232577  |9 1-4842-3257-7 
035 |a (OCoLC)1048739970 
035 |a (DE-599)DNB1141069652 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
044 |a xxu  |c XD-US 
049 |a DE-11 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
100 1 |a Donaldson, Scott E.  |e Verfasser  |0 (DE-588)1164388738  |4 aut 
245 1 0 |a Enterprise cybersecurity study guide  |b how to build a successful cyberdefense program against advanced threats  |c Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam 
264 1 |a New York, NY  |b Apress  |c [2018] 
264 4 |c © 2018 
300 |a xlv, 709 Seiten  |b Illustrationen 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
653 |a Cybersecurity 
653 |a Cyberdefense 
653 |a Cybersecurity framework 
653 |a Cybersecurity architecture 
653 |a Cybersecurity functional areas 
653 |a Cybersecurity capabilities 
653 |a Cybersecurity operations 
653 |a Cybersecurity controls 
653 |a Enterprise security posture 
653 |a Cybersecurity program 
653 |a Cybersecurity program audits 
653 |a Cybersecurity program assessments 
653 |a Cybersecurity measurement 
653 |a Cybersecurity responsibilities 
653 |a Cybersecurity policy 
653 |a Security 
653 |a Infosec 
653 |a Security 
653 |a Data Encryption 
653 |a Systems and Data Security 
689 0 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 |8 1\p  |5 DE-604 
700 1 |a Siegel, Stanley G.  |e Verfasser  |0 (DE-588)1164393596  |4 aut 
700 1 |a Williams, Chris K.  |e Verfasser  |0 (DE-588)1164393871  |4 aut 
700 1 |a Aslam, Abdul  |e Verfasser  |0 (DE-588)1164393952  |4 aut 
710 2 |a Apress L.P.  |0 (DE-588)1065538766  |4 pbl 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |z 978-1-4842-3258-3 
856 4 2 |m X:MVB  |q text/html  |u http://deposit.dnb.de/cgi-bin/dokserv?id=da3d6ab5c74a45b7a6ac01dc66a9535a&prov=M&dok_var=1&dok_ext=htm  |3 Inhaltstext 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
943 1 |a oai:aleph.bib-bvb.de:BVB01-030480796 

Record in the Search Index

_version_ 1818984359117455361
any_adam_object
author Donaldson, Scott E.
Siegel, Stanley G.
Williams, Chris K.
Aslam, Abdul
author_GND (DE-588)1164388738
(DE-588)1164393596
(DE-588)1164393871
(DE-588)1164393952
author_facet Donaldson, Scott E.
Siegel, Stanley G.
Williams, Chris K.
Aslam, Abdul
author_role aut
aut
aut
aut
author_sort Donaldson, Scott E.
author_variant s e d se sed
s g s sg sgs
c k w ck ckw
a a aa
building Verbundindex
bvnumber BV045089996
classification_rvk ST 277
ctrlnum (OCoLC)1048739970
(DE-599)DNB1141069652
discipline Informatik
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02531nam a2200673 c 4500</leader><controlfield tag="001">BV045089996</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180829 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">180717s2018 xxua||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1141069652</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484232576</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-1-4842-3257-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484232577</subfield><subfield code="9">1-4842-3257-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1048739970</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1141069652</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Donaldson, Scott E.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1164388738</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Enterprise cybersecurity study guide</subfield><subfield code="b">how to build a successful cyberdefense program against advanced threats</subfield><subfield code="c">Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Apress</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xlv, 709 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyberdefense</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity framework</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity architecture</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity functional areas</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity capabilities</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity operations</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity controls</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Enterprise security posture</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity program</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity program audits</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity program assessments</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity measurement</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity responsibilities</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity policy</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Infosec</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data Encryption</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Siegel, Stanley G.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1164393596</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Williams, Chris K.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1164393871</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aslam, Abdul</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1164393952</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Apress L.P.</subfield><subfield code="0">(DE-588)1065538766</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-4842-3258-3</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=da3d6ab5c74a45b7a6ac01dc66a9535a&amp;prov=M&amp;dok_var=1&amp;dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030480796</subfield></datafield></record></collection>
id DE-604.BV045089996
illustrated Illustrated
indexdate 2024-12-20T18:17:45Z
institution BVB
institution_GND (DE-588)1065538766
isbn 9781484232576
1484232577
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-030480796
oclc_num 1048739970
open_access_boolean
owner DE-11
owner_facet DE-11
physical xlv, 709 Seiten Illustrationen
publishDate 2018
publishDateSearch 2018
publishDateSort 2018
publisher Apress
record_format marc
spelling Donaldson, Scott E. Verfasser (DE-588)1164388738 aut
Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam
New York, NY Apress [2018]
© 2018
xlv, 709 Seiten Illustrationen
txt rdacontent
n rdamedia
nc rdacarrier
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
Cybersecurity
Cyberdefense
Cybersecurity framework
Cybersecurity architecture
Cybersecurity functional areas
Cybersecurity capabilities
Cybersecurity operations
Cybersecurity controls
Enterprise security posture
Cybersecurity program
Cybersecurity program audits
Cybersecurity program assessments
Cybersecurity measurement
Cybersecurity responsibilities
Cybersecurity policy
Security
Infosec
Data Encryption
Systems and Data Security
Computersicherheit (DE-588)4274324-2 s
1\p DE-604
Siegel, Stanley G. Verfasser (DE-588)1164393596 aut
Williams, Chris K. Verfasser (DE-588)1164393871 aut
Aslam, Abdul Verfasser (DE-588)1164393952 aut
Apress L.P. (DE-588)1065538766 pbl
Erscheint auch als Online-Ausgabe 978-1-4842-3258-3
X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=da3d6ab5c74a45b7a6ac01dc66a9535a&prov=M&dok_var=1&dok_ext=htm Inhaltstext
1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
spellingShingle Donaldson, Scott E.
Siegel, Stanley G.
Williams, Chris K.
Aslam, Abdul
Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4274324-2
title Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats
title_auth Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats
title_exact_search Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats
title_full Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam
title_fullStr Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam
title_full_unstemmed Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam
title_short Enterprise cybersecurity study guide
title_sort enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats
title_sub how to build a successful cyberdefense program against advanced threats
topic Computersicherheit (DE-588)4274324-2 gnd
topic_facet Computersicherheit
url http://deposit.dnb.de/cgi-bin/dokserv?id=da3d6ab5c74a45b7a6ac01dc66a9535a&prov=M&dok_var=1&dok_ext=htm
work_keys_str_mv AT donaldsonscotte enterprisecybersecuritystudyguidehowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats
AT siegelstanleyg enterprisecybersecuritystudyguidehowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats
AT williamschrisk enterprisecybersecuritystudyguidehowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats
AT aslamabdul enterprisecybersecuritystudyguidehowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats
AT apresslp enterprisecybersecuritystudyguidehowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats
  • Availability

‌

Order via interlibrary loan
  • Legal Notice
  • Data Privacy
  • Accessibility Statement
  • First Level Hotline